Full Disclosure mailing list archives

RE: Bios programming...


From: "Matt Marooney" <matt () dynamicanswers com>
Date: Thu, 3 Mar 2005 14:57:54 -0500


I believe the software is Softex TheftGuard.  I wonder how this is
possible.  I understood that most modern BIOS are protected against
writing.  I know there are a fiew viruses that can write to the BIOS?
Anybody know how to store a small program there?


 
   


-----Original Message-----
From: Gerry Eisenhaur [mailto:GEisenhaur () cisco com] 
Sent: Thursday, March 03, 2005 2:28 PM
To: Matt Marooney
Subject: Re: [Full-disclosure] Bios programming...


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Matt,
I too am interested in un-installable apps. Do you know that name of the
application you are talking about (in 1.)? I am interested for different
reasons than you, but think we may be able to help each other.

Thanks,
Gerry

Matt Marooney wrote:
I am trying to write a program to help people who are addicted to 
internet p****graphy.  This application would be tied into an online 
service where someone could sign up for monitoring, and download a 
thin client app.  The application would run in the background of the 
person's computer, and upload the person's internet activity to the 
website.  The service would then email this activity report to 
designated recipients. I have most of the knowledge to create this 
service, but I need to know how to do a couple things:
 
1. I would like the program to be "un-installable".  I've heard of a 
couple of hardware security tracking services that can load a very 
small setup package in the CMOS and if a computer is stolen, and the 
hard drive is replaced, the app reloads itself and the next time the 
computer is on the internet, it sends out a beacon.  Does anyone have 
any insight about how to do something like this?  I want the CMOS 
program to run on boot, and check to see if the monitoring software is

still installed. If it is not, the boot process reloads it.
 
2. obviously, the program does not need to be very large, so I want it

to run in the background and not be visible to the computer's user. 
This is easy, I know, but I want the process to be completely 
invisible. (even to super-geeks)
 
3. I would like to figure out a way to monitor traffic for multiple 
protocols (HTTP, FTP, File Sharing, Chat, etc.) .  I'm wondering if 
there is a way to figure out "bad" requests on a packet level.
 
I really appreciate any help with these questions!  Thank you all,
 
-- Matt
 
 
 


----------------------------------------------------------------------
--

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

- --
+------------------------------------------------------+
| Gerry Eisenhaur                 |           |        |
| Cisco Security Agent           |||         |||       |
| Boxborough, Massachusetts    .|||||.     .|||||.     |
| PGP Key: 0xC13E8AFC       .:|||||||||:.:|||||||||:.  |
| 978-936-0465               C i s c o S y s t e m s   |
+------------------------------------------------------+
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.6 (GNU/Linux)
Comment: Using GnuPG with Thunderbird - http://enigmail.mozdev.org

iD8DBQFCJ2VXRY7FIcE+ivwRAsd/AKCipzmsU+j8cIwNnve3WqbgX/7i/ACeID7t
V6jxmM0BLNyGRzc73blLM5A=
=SWZV
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html


Current thread: